Analyzing energy and time overhead of security mechanisms in Wireless Sensor Networks

The primary requirements of a successful wireless sensor network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash functions and cryptography schemes. By applying these mechanisms, the energy consumption increases, shortening the sensor node lifetime. On the other hand, the selection of a highly secure encryption algorithm might lead to unacceptable computational time, taking into account the constrained processor power of the sensor nodes. This paper presents an overview of the results published in the literature regarding time and energy consumption overhead of hashing and encryption mechanisms in wireless sensor networks. The evaluation of these results helps on the selection of the appropriate algorithms, depending on the application.

[1]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[2]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[3]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[4]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[5]  Falko Dressler,et al.  Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[6]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[7]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[8]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[9]  Falko Dressler,et al.  Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[10]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[11]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[12]  Berk Sunar,et al.  Energy Comparison of AES and SHA-1 for Ubiquitous Computing , 2006, EUC Workshops.

[13]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[14]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.